Finding the Lurking Hacker

Logo
Presented by

Cindy Cullen, President, (ISC)2 NJ Chapter

About this talk

In many recent attacks, including the successful breach at the U.S. Office of Personnel Management (OPM), malicious hackers were inside almost a year before being discovered. Since the breach, many security professionals have been asking themselves, “What should I do? My environment is probably already breached, so how do I find and stop it?” Learn four immediate steps to detect malicious activity and strategies for prevention for a porous perimeter through incident response and threat intelligence. The talk will include specific data-centric security models, user behavior analytics, advanced threat detection and big data analytics.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (109)
Subscribers (18440)
(ISC)² Security Congress channel contains digital content of activities at (ISC)2's Flagship conference event. You'll find keynotes, sessions and related items.